SQL injection vulnerability in profile.php in FluxBB before 1.4.13 and 1.5.x before 1.5.7 allows remote attackers to execute arbitrary SQL commands via the req_new_email parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://fluxbb.org/forums/viewtopic.php?id=8001 - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/129225/FluxBB-1.5.6-SQL-Injection.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Nov/73 - Exploit | |
References | () http://secunia.com/advisories/59038 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98890 - | |
References | () https://fluxbb.org/development/core/tickets/990/ - Vendor Advisory |
Information
Published : 2015-01-13 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-10029
Mitre link : CVE-2014-10029
CVE.ORG link : CVE-2014-10029
JSON object : View
Products Affected
fluxbb
- fluxbb
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')